AU2002346540A1 - System and method for isolating applications from each other - Google Patents
System and method for isolating applications from each otherInfo
- Publication number
- AU2002346540A1 AU2002346540A1 AU2002346540A AU2002346540A AU2002346540A1 AU 2002346540 A1 AU2002346540 A1 AU 2002346540A1 AU 2002346540 A AU2002346540 A AU 2002346540A AU 2002346540 A AU2002346540 A AU 2002346540A AU 2002346540 A1 AU2002346540 A1 AU 2002346540A1
- Authority
- AU
- Australia
- Prior art keywords
- isolating applications
- isolating
- applications
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1416—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights
- G06F12/1425—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights the protection being physical, e.g. cell, word, block
- G06F12/1441—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights the protection being physical, e.g. cell, word, block for a range
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/30—Arrangements for executing machine instructions, e.g. instruction decode
- G06F9/38—Concurrent instruction execution, e.g. pipeline or look ahead
- G06F9/3861—Recovery, e.g. branch miss-prediction, exception handling
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US33426601P | 2001-11-29 | 2001-11-29 | |
| US60/334,266 | 2001-11-29 | ||
| PCT/US2002/037913 WO2003048925A1 (en) | 2001-11-29 | 2002-11-26 | System and method for isolating applications from each other |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| AU2002346540A1 true AU2002346540A1 (en) | 2003-06-17 |
Family
ID=23306406
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| AU2002346540A Abandoned AU2002346540A1 (en) | 2001-11-29 | 2002-11-26 | System and method for isolating applications from each other |
Country Status (4)
| Country | Link |
|---|---|
| US (1) | US7051340B2 (en) |
| EP (1) | EP1449070A1 (en) |
| AU (1) | AU2002346540A1 (en) |
| WO (1) | WO2003048925A1 (en) |
Families Citing this family (60)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8352400B2 (en) | 1991-12-23 | 2013-01-08 | Hoffberg Steven M | Adaptive pattern recognition based controller apparatus and method and human-factored interface therefore |
| US7966078B2 (en) | 1999-02-01 | 2011-06-21 | Steven Hoffberg | Network media appliance system and method |
| US6920550B2 (en) * | 2001-11-15 | 2005-07-19 | Hewlett-Packard Development Company, L.P. | System and method for decoding and executing program binaries |
| US6928536B2 (en) * | 2001-11-29 | 2005-08-09 | Hewlett-Packard Development Company, L.P. | Dynamic execution layer interface for replacing instructions requiring unavailable hardware functionality with patch code and caching |
| US6907519B2 (en) | 2001-11-29 | 2005-06-14 | Hewlett-Packard Development Company, L.P. | Systems and methods for integrating emulated and native code |
| US20030101381A1 (en) * | 2001-11-29 | 2003-05-29 | Nikolay Mateev | System and method for virus checking software |
| US6915513B2 (en) * | 2001-11-29 | 2005-07-05 | Hewlett-Packard Development Company, L.P. | System and method for dynamically replacing code |
| US8108687B2 (en) | 2001-12-12 | 2012-01-31 | Valve Corporation | Method and system for granting access to system and content |
| US7392390B2 (en) | 2001-12-12 | 2008-06-24 | Valve Corporation | Method and system for binding kerberos-style authenticators to single clients |
| US7299451B2 (en) * | 2002-01-24 | 2007-11-20 | International Business Machines Corporation | Remotely driven system for multi-product and multi-platform testing |
| US20030182653A1 (en) * | 2002-03-22 | 2003-09-25 | Giuseppe Desoli | Systems and methods for verifying correct execution of emulated code via dynamic state verification |
| US20030192035A1 (en) * | 2002-04-09 | 2003-10-09 | Duesterwald Ald Evelyn | Systems and methods for implementing efficient execution transfers between successive translations of stack-based program code in a virtual machine environment |
| US6970536B2 (en) * | 2002-04-30 | 2005-11-29 | International Business Machines Corporation | Method and apparatus for processing a voice system application |
| US20040025165A1 (en) * | 2002-08-05 | 2004-02-05 | Giuseppe Desoli | Systems and methods for extending operating system functionality for an application |
| US7815100B2 (en) * | 2004-04-30 | 2010-10-19 | Research In Motion Limited | System and method of owner application control of electronic devices |
| US20040226017A1 (en) * | 2003-05-09 | 2004-11-11 | Leonard Ozgur C. | Mechanism for associating resource pools with operating system partitions |
| US7389512B2 (en) * | 2003-05-09 | 2008-06-17 | Sun Microsystems, Inc. | Interprocess communication within operating system partitions |
| US20040226015A1 (en) * | 2003-05-09 | 2004-11-11 | Leonard Ozgur C. | Multi-level computing resource scheduling control for operating system partitions |
| US7437556B2 (en) * | 2003-05-09 | 2008-10-14 | Sun Microsystems, Inc. | Global visibility controls for operating system partitions |
| US7461080B1 (en) | 2003-05-09 | 2008-12-02 | Sun Microsystems, Inc. | System logging within operating system partitions using log device nodes that are access points to a log driver |
| US8892878B2 (en) * | 2003-05-09 | 2014-11-18 | Oracle America, Inc. | Fine-grained privileges in operating system partitions |
| US7337445B1 (en) | 2003-05-09 | 2008-02-26 | Sun Microsystems, Inc. | Virtual system console for virtual application environment |
| US7194732B2 (en) * | 2003-06-26 | 2007-03-20 | Hewlett-Packard Development Company, L.P. | System and method for facilitating profiling an application |
| EP1649660B1 (en) * | 2003-07-11 | 2019-09-04 | CA, Inc. | System and method for securing networks |
| US7757291B2 (en) * | 2003-09-15 | 2010-07-13 | Trigence Corp. | Malware containment by application encapsulation |
| US7519814B2 (en) * | 2003-09-15 | 2009-04-14 | Trigence Corp. | System for containerization of application sets |
| US20080222160A1 (en) * | 2003-09-15 | 2008-09-11 | Macdonald Craig | Method and system for providing a program for execution without requiring installation |
| US7774762B2 (en) * | 2003-09-15 | 2010-08-10 | Trigence Corp. | System including run-time software to enable a software application to execute on an incompatible computer platform |
| CA2482248A1 (en) * | 2003-09-22 | 2005-03-22 | Donn Rochette | A computing system having user mode critical system elements as shared libraries |
| US7853947B2 (en) * | 2004-09-30 | 2010-12-14 | Citrix Systems, Inc. | System for virtualizing access to named system objects using rule action associated with request |
| US8095940B2 (en) | 2005-09-19 | 2012-01-10 | Citrix Systems, Inc. | Method and system for locating and accessing resources |
| US8171479B2 (en) * | 2004-09-30 | 2012-05-01 | Citrix Systems, Inc. | Method and apparatus for providing an aggregate view of enumerated system resources from various isolation layers |
| US7680758B2 (en) | 2004-09-30 | 2010-03-16 | Citrix Systems, Inc. | Method and apparatus for isolating execution of software applications |
| US7752600B2 (en) * | 2004-09-30 | 2010-07-06 | Citrix Systems, Inc. | Method and apparatus for providing file-type associations to multiple applications |
| US8117559B2 (en) * | 2004-09-30 | 2012-02-14 | Citrix Systems, Inc. | Method and apparatus for virtualizing window information |
| EP1855217A3 (en) | 2004-09-30 | 2009-01-07 | Citrix Systems, Inc. | Method and apparatus for isolating execution of software applications |
| US7735136B2 (en) * | 2005-04-18 | 2010-06-08 | Vmware, Inc. | 0-touch and 1-touch techniques for improving the availability of computer programs under protection without compromising security |
| EP1720098A1 (en) * | 2005-05-02 | 2006-11-08 | Trigence Corp. | System including run-time software to enable a software application to execute on an incompatible computer platform |
| CN101278260B (en) * | 2005-06-07 | 2012-07-18 | 威睿公司 | A Constraint Injection Method to Make Software Programs Free from Vulnerabilities and Attacks |
| US20070083620A1 (en) * | 2005-10-07 | 2007-04-12 | Pedersen Bradley J | Methods for selecting between a predetermined number of execution methods for an application program |
| US8131825B2 (en) | 2005-10-07 | 2012-03-06 | Citrix Systems, Inc. | Method and a system for responding locally to requests for file metadata associated with files stored remotely |
| US7779034B2 (en) * | 2005-10-07 | 2010-08-17 | Citrix Systems, Inc. | Method and system for accessing a remote file in a directory structure associated with an application program executing locally |
| US8938473B2 (en) | 2006-02-23 | 2015-01-20 | Oracle America, Inc. | Secure windowing for labeled containers |
| US7885975B2 (en) | 2006-02-23 | 2011-02-08 | Oracle America, Inc. | Mechanism for implementing file access control using labeled containers |
| US7882227B2 (en) | 2006-02-23 | 2011-02-01 | Oracle America, Inc. | Mechanism for implementing file access control across a network using labeled containers |
| US8938554B2 (en) | 2006-03-02 | 2015-01-20 | Oracle America, Inc. | Mechanism for enabling a network address to be shared by multiple labeled containers |
| US7930707B2 (en) * | 2006-05-10 | 2011-04-19 | Oracle International Corp. | Optimizing code motion with delayed exception handling |
| US8171483B2 (en) | 2007-10-20 | 2012-05-01 | Citrix Systems, Inc. | Method and system for communicating between isolation environments |
| US7792934B2 (en) * | 2008-01-02 | 2010-09-07 | Citrix Systems International Gmbh | Loading of server-stored user profile data |
| US20090183182A1 (en) * | 2008-01-10 | 2009-07-16 | Microsoft Corporation | Dynamic Composition of Virtualized Applications |
| EP2315124B1 (en) | 2008-01-27 | 2020-08-05 | Citrix Systems, Inc. | Methods and systems for remoting three dimensional graphics |
| JP4696151B2 (en) * | 2008-10-23 | 2011-06-08 | 株式会社エヌ・ティ・ティ・ドコモ | Information processing apparatus and memory management method |
| US20100125830A1 (en) * | 2008-11-20 | 2010-05-20 | Lockheed Martin Corporation | Method of Assuring Execution for Safety Computer Code |
| US8478948B2 (en) * | 2008-12-04 | 2013-07-02 | Oracle America, Inc. | Method and system for efficient tracing and profiling of memory accesses during program execution |
| US9594900B2 (en) * | 2008-12-09 | 2017-03-14 | Microsoft Technology Licensing, Llc | Isolating applications hosted by plug-in code |
| US8090797B2 (en) | 2009-05-02 | 2012-01-03 | Citrix Systems, Inc. | Methods and systems for launching applications into existing isolation environments |
| US9104514B2 (en) * | 2011-01-11 | 2015-08-11 | International Business Machines Corporation | Automated deployment of applications with tenant-isolation requirements |
| US9152548B2 (en) * | 2012-01-17 | 2015-10-06 | Vmware, Inc. | Controlling access to a privileged resource in user-mode system level mobile virtualization using a ptrace () system call |
| CN106326735B (en) * | 2015-07-02 | 2020-04-03 | 腾讯科技(深圳)有限公司 | Method and apparatus for preventing injection |
| US10241706B2 (en) * | 2016-05-20 | 2019-03-26 | Renesas Electronics Corporation | Semiconductor device and its memory access control method |
Family Cites Families (24)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPH02202642A (en) * | 1989-02-01 | 1990-08-10 | Toshiba Corp | Device for supervising program action |
| JPH0546568A (en) * | 1991-08-08 | 1993-02-26 | Internatl Business Mach Corp <Ibm> | Dispersion application execution device and method |
| US5768593A (en) * | 1996-03-22 | 1998-06-16 | Connectix Corporation | Dynamic cross-compilation system and method |
| US7058822B2 (en) * | 2000-03-30 | 2006-06-06 | Finjan Software, Ltd. | Malicious mobile code runtime monitoring system and methods |
| US6167520A (en) * | 1996-11-08 | 2000-12-26 | Finjan Software, Inc. | System and method for protecting a client during runtime from hostile downloadables |
| US5974549A (en) * | 1997-03-27 | 1999-10-26 | Soliton Ltd. | Security monitor |
| US6275938B1 (en) * | 1997-08-28 | 2001-08-14 | Microsoft Corporation | Security enhancement for untrusted executable code |
| IL126149A (en) * | 1997-09-09 | 2003-07-31 | Sanctum Ltd | Method and system for protecting operations of trusted internal networks |
| US6473894B1 (en) * | 1999-01-29 | 2002-10-29 | International Business Machines Corporation | Dynamic runtime and test architecture for Java applets |
| US7203946B2 (en) * | 1999-10-11 | 2007-04-10 | Hewlett-Packard Development Company, L.P. | System and method for intercepting, instrumenting and characterizing usage of an application programming interface |
| US6292874B1 (en) * | 1999-10-19 | 2001-09-18 | Advanced Technology Materials, Inc. | Memory management method and apparatus for partitioning homogeneous memory and restricting access of installed applications to predetermined memory ranges |
| IL132916A (en) * | 1999-11-14 | 2004-02-08 | Mcafee Inc | Method and system for intercepting an application program interface |
| GB0011020D0 (en) * | 2000-05-09 | 2000-06-28 | Ibm | Intercepting system API calls |
| US6871213B1 (en) * | 2000-10-11 | 2005-03-22 | Kana Software, Inc. | System and method for web co-navigation with dynamic content including incorporation of business rule into web document |
| US20020178375A1 (en) * | 2001-01-31 | 2002-11-28 | Harris Corporation | Method and system for protecting against malicious mobile code |
| US6920550B2 (en) * | 2001-11-15 | 2005-07-19 | Hewlett-Packard Development Company, L.P. | System and method for decoding and executing program binaries |
| US20030101381A1 (en) * | 2001-11-29 | 2003-05-29 | Nikolay Mateev | System and method for virus checking software |
| US6907519B2 (en) * | 2001-11-29 | 2005-06-14 | Hewlett-Packard Development Company, L.P. | Systems and methods for integrating emulated and native code |
| US6928536B2 (en) * | 2001-11-29 | 2005-08-09 | Hewlett-Packard Development Company, L.P. | Dynamic execution layer interface for replacing instructions requiring unavailable hardware functionality with patch code and caching |
| US20030101439A1 (en) * | 2001-11-29 | 2003-05-29 | Giuseppe Desoli | System and method for supporting emulation of a computer system through dynamic code caching and transformation |
| US6915513B2 (en) * | 2001-11-29 | 2005-07-05 | Hewlett-Packard Development Company, L.P. | System and method for dynamically replacing code |
| US20030182653A1 (en) * | 2002-03-22 | 2003-09-25 | Giuseppe Desoli | Systems and methods for verifying correct execution of emulated code via dynamic state verification |
| US20030192035A1 (en) * | 2002-04-09 | 2003-10-09 | Duesterwald Ald Evelyn | Systems and methods for implementing efficient execution transfers between successive translations of stack-based program code in a virtual machine environment |
| US20040025165A1 (en) * | 2002-08-05 | 2004-02-05 | Giuseppe Desoli | Systems and methods for extending operating system functionality for an application |
-
2002
- 2002-04-19 US US10/126,647 patent/US7051340B2/en not_active Expired - Fee Related
- 2002-11-26 WO PCT/US2002/037913 patent/WO2003048925A1/en not_active Ceased
- 2002-11-26 EP EP02784608A patent/EP1449070A1/en not_active Withdrawn
- 2002-11-26 AU AU2002346540A patent/AU2002346540A1/en not_active Abandoned
Also Published As
| Publication number | Publication date |
|---|---|
| EP1449070A1 (en) | 2004-08-25 |
| US20030101292A1 (en) | 2003-05-29 |
| WO2003048925A1 (en) | 2003-06-12 |
| US7051340B2 (en) | 2006-05-23 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| AU2002346540A1 (en) | System and method for isolating applications from each other | |
| AU2002307768A1 (en) | System and method for phytomonitoring | |
| AU2002256380A1 (en) | Service provision system and method | |
| AU2002306870A1 (en) | Pdstudio design system and method | |
| AU2001268199A1 (en) | System and method for integrating multiple applications | |
| AU2002357809A1 (en) | System and method for identifying desirable subscribers | |
| AU2002361342A1 (en) | System and method for selecting access point | |
| AU2002357091A1 (en) | System and method for music inditification | |
| AU2002257178A1 (en) | Simulation system and method | |
| AU2002235412A1 (en) | Method and system for product selection | |
| AU2002310341A1 (en) | Method and system for providing context awareness | |
| AU2002246957A1 (en) | Smart-caching system and method | |
| AU2002245558A1 (en) | System and method for integrating offers | |
| WO2002077885A8 (en) | Distribution system and method of operation thereof | |
| AU2002310515A1 (en) | Risk stripping system and method | |
| AU2002357855A1 (en) | System and method for providing distributed hdt-rt networks | |
| AU2002227017A1 (en) | Method and system for providing rebates | |
| AU2002330297A1 (en) | Cost settling service method and cost settling service system | |
| AU2002231891A1 (en) | Telepayment method and system | |
| AU2002252683A1 (en) | Beyondguidetm method and system | |
| AU2002330332A1 (en) | Self-settlement method and system | |
| AU2001286496A1 (en) | Vcd-on-demand system and method | |
| AU2002217720A1 (en) | Shelf system and method for its assembly | |
| AU2002235108A1 (en) | System and method for supervision | |
| AU2001254789A1 (en) | Location method and system |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| MK6 | Application lapsed section 142(2)(f)/reg. 8.3(3) - pct applic. not entering national phase |